US12111954B2 - Method and system of providing personal information based on blockchain - Google Patents

Method and system of providing personal information based on blockchain Download PDF

Info

Publication number
US12111954B2
US12111954B2 US17/408,277 US202117408277A US12111954B2 US 12111954 B2 US12111954 B2 US 12111954B2 US 202117408277 A US202117408277 A US 202117408277A US 12111954 B2 US12111954 B2 US 12111954B2
Authority
US
United States
Prior art keywords
user
data
web service
bcp
agent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active, expires
Application number
US17/408,277
Other versions
US20210383024A1 (en
Inventor
Jinhong Yang
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industry Academic Cooperation Foundation of Inje University
Original Assignee
Industry Academic Cooperation Foundation of Inje University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industry Academic Cooperation Foundation of Inje University filed Critical Industry Academic Cooperation Foundation of Inje University
Assigned to INJE UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUNDATION reassignment INJE UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUNDATION ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: YANG, JINHONG
Publication of US20210383024A1 publication Critical patent/US20210383024A1/en
Application granted granted Critical
Publication of US12111954B2 publication Critical patent/US12111954B2/en
Active legal-status Critical Current
Adjusted expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/102Entity profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/2866Architectures; Arrangements
    • H04L67/30Profiles
    • H04L67/306User profiles
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/51Discovery or management thereof, e.g. service location protocol [SLP] or web services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/42Anonymization, e.g. involving pseudonyms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/53Network services using third party service providers

Definitions

  • a blockchain includes a series of blocks which may accommodate any data like an existing open ledger. Also, the blocks are connected and protected together using encryption. Some researchers use a blockchain for PII management. However, the recently enacted General Data Protection Regulation (GDPR) is intended to protect personal information, and thus institutions are required to pay special attention to individual consent and data sharing. It is necessary to obtain consent before personal data is analyzed, and also institutions are responsible for independently withdrawing or deleting the data (also known as the “right to be forgotten”).
  • GDPR General Data Protection Regulation
  • a blockchain PII storage architecture is based on the “immutability” of data. On the contrary, the GDPR requires that personal information be changeable and removable at a request of the data owner.
  • the present invention is directed to providing a blockchain-based personal information providing method and system for providing user data using a contract with a blockchain controller having an access right.
  • a blockchain-based personal information providing method executed in a computer device including at least one processor configured to execute computer-readable instructions included in a memory, the method including making, by the at least one processor, a data privacy-related contract with a user, and providing, by the at least one processor, user data corresponding to personal information of the user according to the data privacy-related contract to a service for accessing the user data using a contract with the service.
  • the making of the data privacy-related contract with the user may include performing user authentication for data interoperation with an online data storage, which is used by the user to store the user data, and setting an access right range for the online data storage when the user authentication is completed.
  • the setting of the access right range may include setting an accessible data entry and a monitoring period.
  • the making of the data privacy-related contract with the user may include receiving information on a data providing range that the user has agreed on upon subscription from a service provider of the online data storage.
  • the making of the data privacy-related contract with the user may include providing a monitorable data list upon subscription to the service and then setting a data entry selected through the data list as a monitoring target.
  • the making of the data privacy-related contract with the user may include contracting with an online data storage, which is used by the user to store the user data, and providing an interface function of interoperating with the online data storage.
  • the providing of the user data may include providing a function of interoperating with user data generated by a terminal of the user through an agent for monitoring a service usage environment of the user.
  • the providing of the user data may include, when the user selects one piece of the user data as content to be posted to the service, acquiring access information of the content from an online data storage in which the user data is stored and transmitting the access information to the service, and transmitting the content stored in the online data storage to the service under the contract with the service in response to a request from the service using the access information.
  • the providing of the user data may further include generating a transaction for a record of use of the user data by the service after the content is transmitted to the service.
  • a computer device including at least one processor configured to execute computer-readable instructions included in a memory.
  • the at least one processor includes a controller configured to make a data privacy-related contract with a user and provide user data corresponding to personal information of the user according to the data privacy-related contract to a service for accessing the user data using a contract with the service.
  • FIG. 1 is a block diagram illustrating an example of an internal configuration of a computer device according to an exemplary embodiment of the present invention
  • FIG. 2 is a diagram illustrating an example of a user data usage environment according to an exemplary embodiment of the present invention
  • FIG. 3 is a diagram illustrating an example of recording and management of user data used by a service provider according to an exemplary embodiment of the present invention
  • FIG. 4 is a diagram illustrating an example of an actual service configuration employing a blockchain controller for privacy (BCP) according to an exemplary embodiment of the present invention
  • FIG. 5 is a flowchart illustrating a data privacy-related contract process between a BCP and a user according to an exemplary embodiment of the present invention
  • FIG. 6 is an example diagram illustrating various user environments in which a web service is available
  • FIG. 7 is an example diagram illustrating a process of setting a monitoring target through a BCP according to an exemplary embodiment of the present invention.
  • FIG. 8 is an example diagram illustrating a process of providing a BCP's own personal data storage according to an exemplary embodiment of the present invention.
  • FIG. 9 is an example of a sequence diagram illustrating a data transmission process employing a BCP agent according to an exemplary embodiment of the present invention.
  • FIG. 1 is a block diagram illustrating an example of an internal configuration of a computer device according to an exemplary embodiment of the present invention.
  • a personal information providing system may be implemented through a computer device 100 of FIG. 1 .
  • the computer device 100 may include a memory 110 , a processor 120 , a communication interface 130 , and an input/output interface 140 as components for performing a personal information providing method to be described below.
  • the memory 110 is a computer-readable recording medium and may include a random access memory (RAM), a read-only memory (ROM), and a permanent mass storage device such as a disk drive.
  • RAM random access memory
  • ROM read-only memory
  • a permanent mass storage device such as a disk drive
  • the ROM and the permanent mass storage device may be included in the computer device 100 as a permanent storage device which is distinct from the memory 110 .
  • an operating system (OS) and at least one program code may be stored in the memory 110 .
  • OS operating system
  • These software components may be loaded from a computer-readable recording medium distinct from the memory 110 to the memory 110 .
  • Such a computer-readable recording medium may include a floppy drive, a disk, tape, a digital versatile disc (DVD)/compact disc (CD)-ROM drive, a memory card, and the like.
  • the software components may be loaded to the memory 110 through the communication interface 130 rather than a computer-readable recording medium.
  • the software components may be loaded to the memory 110 of the computer device 100 on the basis of a computer program installed by files received through a network 160 .
  • the processor 120 may be configured to process an instruction of the computer program by performing basic arithmetic, logical, and input/output computations.
  • An instruction may be provided to the processor 120 by the memory 110 or the communication interface 130 .
  • the processor 120 may be configured to execute a received instruction according to a program code stored in a storage device such as the memory 110 .
  • the communication interface 130 may provide a function for the computer device 100 to communicate with other devices (e.g., the storage devices described above) through the network 160 .
  • a request, an instruction, data, a file, or the like which is generated by the processor 120 of the computer device 100 according to a program code stored in a storage device, such as the memory 110 , may be transmitted to other devices through the network 160 according to control of the communication interface 130 .
  • a request, an instruction, data, a file, or the like from another device may be received by the computer device 100 through the network 160 and then the communication interface 130 of the computer device 100 .
  • the request, instruction, data, or the like received through the communication interface 130 may be transmitted to the processor 120 or the memory 110 , and the file or the like may be stored in a storage medium (the above-described permanent storage device) that the computer device 100 may further include.
  • the input/output interface 140 may be a device for interfacing with the input/output device 150 .
  • the input device may include a device, such as a microphone, a keyboard, or a mouse
  • the output device may include a device, such as a display or a speaker.
  • the input/output interface 140 may be a device for interfacing with a device, such as a touchscreen, in which functions for input and output are integrated.
  • the input/output device 150 may be integrated into the computer device 100 .
  • the computer device 100 may include fewer or more components than shown in FIG. 1 . However, it is unnecessary to clearly show most conventional components.
  • the computer device 100 may be implemented to include at least some of the aforementioned examples of the input/output device 150 or may further include other components such as a transceiver and a database.
  • a personal information providing system implemented as the computer device 100 will be referred to as a blockchain controller for privacy (BCP).
  • BCP blockchain controller for privacy
  • FIG. 2 is a diagram illustrating an example of a user data usage environment according to an exemplary embodiment of the present invention.
  • the service provider may examine usage record and usage information of the user data by accessing the user data under a smart contract with a BCP having a right to access user data.
  • FIG. 3 is a diagram illustrating an example of recording and management of user data used by a service provider according to an exemplary embodiment of the present invention.
  • data of an actual user is moved to a cloud platform through social service provider #B.
  • Other social service providers #A and #C may collect user data through BCP #2.
  • the history of services using personally identifiable information (PII) through BCPs #1 and #2 authenticated by the user may be examined, and service providers are also required to use a function in the form of a BCP.
  • PII personally identifiable information
  • FIG. 4 is a diagram illustrating an example of an actual service configuration according to an exemplary embodiment of the present invention.
  • a user may delegate a right to access his or her data to a BCP, and a service provider may use user data under a contract with the BCP to which the right is delegated.
  • the BCP makes a data privacy-related contract with a user.
  • the BCP provides its own personal data storage or vault.
  • the BCP makes a contract with an online data storage used by the user.
  • the BCP provides an interface function of interoperating with the online data storage used by the user.
  • the BCP provides a BCP agent for monitoring a service usage environment of the user (an environment in which personal information-related data is generated).
  • the BCP provides a contract for data privacy as a method for clearly monitoring exposure of user data at various points of contact at which the user data is exposed online.
  • SDK software development kit
  • API application program interface
  • a web-based or application-based server corresponds to (1), and corresponding service providers are required to provide information on a right to monitor data as well.
  • FIG. 5 is a flowchart illustrating a data privacy-related contract process between a BCP and a user.
  • the user may access the BCP, to which the user wants to delegate the right to access his or her data, for the purpose of contract formation (S 501 ), and the BCP may receive a contract request of the user accessing the BCP (S 501 ).
  • the BCP may receive the selection of a service (an online data storage or a service provider) used by the user (S 502 ).
  • a service an online data storage or a service provider
  • the BCP determines whether the BCP interoperates with the service selected by the user (S 503 ). When the BCP does not interoperate with the service used by the user, a blockchain-based personal information providing service is not provided.
  • the BCP may perform user authentication for data interoperation with the service (S 504 ).
  • the BCP may request access to the service used by the user like an open authorization (OAuth) method.
  • OAuth open authorization
  • the BCP may set the scope of contract rights (S 505 ).
  • the scope of contract rights refers to the scope of access rights and may include, for example, data entries and monitoring and tracking periods.
  • the service provider may provide information on the scope of data provision, the time point of consent, etc. agreed upon by the user at the time of subscription.
  • the BCP may set data accessibility such as API-based access and direct file access (DFA).
  • the BCP may set data coverage including whether to allow data access according to classes such as potential PII (PPII) and PII.
  • the BCP may set data anonymization according to the user's request.
  • information for the connection with the BCP may be set in a user environment (the terminal, application, Internet of things (IoT), etc.), and the BCP may receive the information for the connection with the user environment (S 506 ).
  • the BCP may provide an API gateway address to which data of the user will be uploaded.
  • the setting operation with the terminal (S 506 ) may be omitted.
  • the BCP may store information, which is set for the service used by the user through the above-described operations 5501 to 5506 , as contract information with the user (S 507 ).
  • a user may subscribe to a specific web service that he or she wants to use on a browser through various user environments.
  • the web service may confirm an intention to use a BCP in a user subscription process.
  • a BCP login process may be provided, and the user may log in to the BCP used by himself or herself through the BCP login process.
  • the BCP may provide a list of data which may be monitored regarding the user's personal information requested by the web service that the user wants to subscribe to and then set a data entry selected by the user through the list as a monitoring target.
  • the BCP may provide the function of a personal data storage or vault.
  • Dropbox allows existing personal cloud data storage providers or productive tool providers to extend in a BCP form by adding a function of monitoring blockchain-based data input and output, controlling a right of user data input and output for smart contract-based external third party services, and monitoring whether to provide the right to a data management environment.
  • Google may contract with a separate BCP, and only the BCP may manage points of contact exposed to third parties so that Google may exclusively provide its own BCP function in conjunction with the BCP.
  • a data transmission process employing a BCP agent is as follows.
  • FIG. 9 is a sequence diagram illustrating a data transmission process employing a BCP agent.
  • a BCP agent acquires content information that the user wants to be externally exposed and then transmits the content information to the BCP.
  • the BCP may acquire an access uniform resource locator (URL) for the corresponding photograph information on the online data storage with which the user has contracted and then generate and transmit a separate URL for user data access.
  • URL uniform resource locator
  • the web service may search for BCP information in the URL information of the photograph and request the photograph from the BCP.
  • the BCP may make a smart contract with the web service and then transmit the photograph (the URL or the photograph in the form of a file) that the user wants to post to the web service. Then, the web service may use the actual user data, that is, the photograph.
  • the BCP may generate a transaction for a record of use of the user data by a provider of the web service.
  • the BCP may provide the BCP agent for monitoring a user service usage environment (personal information-related data generation environment).
  • the BCP agent provides a function for interoperation between the BCP and user data generated by a general terminal or in a user device environment.
  • the BCP agent may be installed in each of the following environments.
  • a function for monitoring PII-related information for example, permission, user generated data, and a system log, may be provided at the OS level.
  • a function for monitoring use or application of PII by web services which do not provide a web service framework, may be provided using an extension of a browser installed on a user terminal.
  • a function for representing PII-related information in the form of, for example, “Privacy.jr” in a web service and monitoring the PII-related information may be provided.
  • the online data may be transmitted through BCP-based relay, and 2) when it is necessary to upload user data at the time point of request, the data may be uploaded and then transmitted through the same process as described in 1).
  • the above-described device may be implemented as a hardware component, a software component, and/or a combination of a hardware component and a software component.
  • the device and components described in the exemplary embodiments may be implemented using one or more general-purpose computers or special purpose computers such as a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable gate array (FPGA), a programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to an instruction.
  • the device may execute an OS and one or more software applications executed on the OS.
  • the device may access, store, manipulate, process, and generate data in response to the execution of the software.
  • the device may include a plurality of processing elements and/or a plurality of types of processing elements.
  • the device may include a plurality of processors or a single processor and a single controller.
  • other processing configurations such as a parallel processor, are also possible.
  • Software may include a computer program, code, an instruction, or one or more combinations thereof and may form the device to be operated as desired or may independently or collectively command the device.
  • the software and/or data may be permanently or temporarily embodied in any type of machine, component, physical device, or computer storage medium or device in order to be interpreted by the device or provide an instruction or data to the device.
  • the software may be distributed over a networked computer system to be stored or executed in a distributed manner.
  • the software and data may be stored on one or more computer-readable recording media.
  • a method according to an exemplary embodiment may be implemented in a program instruction form, which may be executed through various computing devices, and recorded on a computer-readable medium.
  • the medium may continuously store the computer-executable program or temporarily store the computer-executable program for execution or downloading.
  • the medium may be a variety of recording devices or storage devices in the form of a single piece of hardware or a combination of a plurality of pieces of hardware. The medium is not limited to a medium directly connected to any computer system and may be dispersed on a network.
  • the medium examples include a magnetic medium, such as a hard disk, a floppy disk, and magnetic tape, an optical recording medium, such as a CD-ROM and a DVD, a magneto-optical medium, such as a floptical disk, and media which are specially configured to store program instructions such as a ROM, a RAM, and a flash memory.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Computing Systems (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Medical Informatics (AREA)
  • Tourism & Hospitality (AREA)
  • Human Computer Interaction (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Provided are a method and system of providing personal information on the basis of a blockchain. The blockchain-based personal information providing method includes making a data privacy-related contract with a user and providing user data, which corresponds to personal information of the user according to the data privacy-related contract, to a service for accessing the user data using a contract with the service.

Description

CROSS-REFERENCE TO RELATED APPLICATION
This application is a continuation of International Patent Application No. PCT/KR2019/008233, filed on Jul. 4, 2019, which is based upon and claims priority to and the benefit of Korean Patent Application No. 10-2019-0037652, filed on Apr. 1, 2019, the disclosure of which is incorporated herein by reference in its entirety.
BACKGROUND 1. Field of the Invention
The present invention relates to a technology for providing personal information.
2. Discussion of Related Art
To provide a user-centered service, websites collect a considerable amount of personally identifiable information (PII) (e.g., age, race, social security number, residential address, and driver's license). Currently, more than 50 million people use several social networking services (SNSs) and provide massive amounts of PII to the SNSs. All these SNSs, other websites, and mobile applications allow login to or registration for a premium service. Sometimes, PII is used to authenticate the identification of a customer in an organization. Most of the SNSs and applications are free, and thus many studies have found that such organizations infringe on PII. Actually, these organizations store, distribute, and analyze important PII to generate a business model through user profiling. Large technology companies use a third-party service of companies which provide the PII of customers. Ultimately, these auxiliary organizations collect, analyze, and distribute data from several organizations. As a result, users do not know a final destination of the data. We all enjoy the benefits of a data-driven industry, but illegal use of PII is a dark side of the data-driven industry. The Guardian said in April 2018 that Facebook, the largest SNS website, infringed on 87 million pieces of personal data and users' PII. Persistent data breaches occur in the era of big data mentioned in several studies. According to Armerding, data breaches occurred at different organizations, such as Yahoo (3 billion), eBay (14.5 billion), Adobe (38 million people), JP Morgan (76 million people), the U.S Human Resource Administration (22 million people), and the like. According to the breach level index (BLI) of Gemalto, data of 4 million people was leaked every year, and 74% thereof was used for identity theft. Forbes magazine has identified data as the new currency of trade marketing. It has been reported that about 200 million dollars is invested to exchange PII. Companies exchange customers' data to make a profit. Inter-firm communication will widely apply, and accordingly, it is necessary to consider PII management and tracking.
Blockchain technology has drawn many researchers' attention and is being used beyond the field of cryptocurrency. A blockchain includes a series of blocks which may accommodate any data like an existing open ledger. Also, the blocks are connected and protected together using encryption. Some researchers use a blockchain for PII management. However, the recently enacted General Data Protection Regulation (GDPR) is intended to protect personal information, and thus institutions are required to pay special attention to individual consent and data sharing. It is necessary to obtain consent before personal data is analyzed, and also institutions are responsible for independently withdrawing or deleting the data (also known as the “right to be forgotten”). A blockchain PII storage architecture is based on the “immutability” of data. On the contrary, the GDPR requires that personal information be changeable and removable at a request of the data owner.
SUMMARY OF THE INVENTION
The present invention is directed to providing a blockchain-based personal information providing method and system for providing user data using a contract with a blockchain controller having an access right.
According to an aspect of the present invention, there is provided a blockchain-based personal information providing method executed in a computer device including at least one processor configured to execute computer-readable instructions included in a memory, the method including making, by the at least one processor, a data privacy-related contract with a user, and providing, by the at least one processor, user data corresponding to personal information of the user according to the data privacy-related contract to a service for accessing the user data using a contract with the service.
The making of the data privacy-related contract with the user may include performing user authentication for data interoperation with an online data storage, which is used by the user to store the user data, and setting an access right range for the online data storage when the user authentication is completed.
The setting of the access right range may include setting an accessible data entry and a monitoring period.
The making of the data privacy-related contract with the user may include receiving information on a data providing range that the user has agreed on upon subscription from a service provider of the online data storage.
The making of the data privacy-related contract with the user may include providing a monitorable data list upon subscription to the service and then setting a data entry selected through the data list as a monitoring target.
The making of the data privacy-related contract with the user may include contracting with an online data storage, which is used by the user to store the user data, and providing an interface function of interoperating with the online data storage.
The providing of the user data may include providing a function of interoperating with user data generated by a terminal of the user through an agent for monitoring a service usage environment of the user.
The providing of the user data may include, when the user selects one piece of the user data as content to be posted to the service, acquiring access information of the content from an online data storage in which the user data is stored and transmitting the access information to the service, and transmitting the content stored in the online data storage to the service under the contract with the service in response to a request from the service using the access information.
The providing of the user data may further include generating a transaction for a record of use of the user data by the service after the content is transmitted to the service.
According to another aspect of the present invention, there is provided a computer device including at least one processor configured to execute computer-readable instructions included in a memory. The at least one processor includes a controller configured to make a data privacy-related contract with a user and provide user data corresponding to personal information of the user according to the data privacy-related contract to a service for accessing the user data using a contract with the service.
BRIEF DESCRIPTION OF THE DRAWINGS
The above and other objects, features and advantages of the present invention will become more apparent to those of ordinary skill in the art by describing exemplary embodiments thereof in detail with reference to the accompanying drawings, in which:
FIG. 1 is a block diagram illustrating an example of an internal configuration of a computer device according to an exemplary embodiment of the present invention;
FIG. 2 is a diagram illustrating an example of a user data usage environment according to an exemplary embodiment of the present invention;
FIG. 3 is a diagram illustrating an example of recording and management of user data used by a service provider according to an exemplary embodiment of the present invention;
FIG. 4 is a diagram illustrating an example of an actual service configuration employing a blockchain controller for privacy (BCP) according to an exemplary embodiment of the present invention;
FIG. 5 is a flowchart illustrating a data privacy-related contract process between a BCP and a user according to an exemplary embodiment of the present invention;
FIG. 6 is an example diagram illustrating various user environments in which a web service is available;
FIG. 7 is an example diagram illustrating a process of setting a monitoring target through a BCP according to an exemplary embodiment of the present invention;
FIG. 8 is an example diagram illustrating a process of providing a BCP's own personal data storage according to an exemplary embodiment of the present invention; and
FIG. 9 is an example of a sequence diagram illustrating a data transmission process employing a BCP agent according to an exemplary embodiment of the present invention.
DETAILED DESCRIPTION OF EXEMPLARY EMBODIMENTS
Hereinafter, exemplary embodiments of the present invention will be described in detail with reference to the accompanying drawings.
FIG. 1 is a block diagram illustrating an example of an internal configuration of a computer device according to an exemplary embodiment of the present invention.
For example, a personal information providing system according to exemplary embodiments of the present invention may be implemented through a computer device 100 of FIG. 1 . As shown in FIG. 1 , the computer device 100 may include a memory 110, a processor 120, a communication interface 130, and an input/output interface 140 as components for performing a personal information providing method to be described below.
The memory 110 is a computer-readable recording medium and may include a random access memory (RAM), a read-only memory (ROM), and a permanent mass storage device such as a disk drive. Here, the ROM and the permanent mass storage device, such as a disk drive, may be included in the computer device 100 as a permanent storage device which is distinct from the memory 110. Also, an operating system (OS) and at least one program code may be stored in the memory 110. These software components may be loaded from a computer-readable recording medium distinct from the memory 110 to the memory 110. Such a computer-readable recording medium may include a floppy drive, a disk, tape, a digital versatile disc (DVD)/compact disc (CD)-ROM drive, a memory card, and the like. According to another exemplary embodiment, the software components may be loaded to the memory 110 through the communication interface 130 rather than a computer-readable recording medium. For example, the software components may be loaded to the memory 110 of the computer device 100 on the basis of a computer program installed by files received through a network 160.
The processor 120 may be configured to process an instruction of the computer program by performing basic arithmetic, logical, and input/output computations. An instruction may be provided to the processor 120 by the memory 110 or the communication interface 130. For example, the processor 120 may be configured to execute a received instruction according to a program code stored in a storage device such as the memory 110.
The communication interface 130 may provide a function for the computer device 100 to communicate with other devices (e.g., the storage devices described above) through the network 160. For example, a request, an instruction, data, a file, or the like which is generated by the processor 120 of the computer device 100 according to a program code stored in a storage device, such as the memory 110, may be transmitted to other devices through the network 160 according to control of the communication interface 130. In reverse, a request, an instruction, data, a file, or the like from another device may be received by the computer device 100 through the network 160 and then the communication interface 130 of the computer device 100. The request, instruction, data, or the like received through the communication interface 130 may be transmitted to the processor 120 or the memory 110, and the file or the like may be stored in a storage medium (the above-described permanent storage device) that the computer device 100 may further include.
The input/output interface 140 may be a device for interfacing with the input/output device 150. For example, the input device may include a device, such as a microphone, a keyboard, or a mouse, and the output device may include a device, such as a display or a speaker. As another example, the input/output interface 140 may be a device for interfacing with a device, such as a touchscreen, in which functions for input and output are integrated. The input/output device 150 may be integrated into the computer device 100.
Also, according to other exemplary embodiments, the computer device 100 may include fewer or more components than shown in FIG. 1 . However, it is unnecessary to clearly show most conventional components. For example, the computer device 100 may be implemented to include at least some of the aforementioned examples of the input/output device 150 or may further include other components such as a transceiver and a database.
A personal information providing system implemented as the computer device 100 will be referred to as a blockchain controller for privacy (BCP).
FIG. 2 is a diagram illustrating an example of a user data usage environment according to an exemplary embodiment of the present invention.
Referring to FIG. 2 , according to the present invention, when a service provider of a social service, a search service, a mail service, a media service, etc. wants to use user data corresponding to personal data, the service provider may examine usage record and usage information of the user data by accessing the user data under a smart contract with a BCP having a right to access user data.
FIG. 3 is a diagram illustrating an example of recording and management of user data used by a service provider according to an exemplary embodiment of the present invention.
For example, as shown in FIG. 3 , data of an actual user is moved to a cloud platform through social service provider #B. Other social service providers #A and #C may collect user data through BCP #2.
In this case, according to the present invention, the history of services using personally identifiable information (PII) through BCPs #1 and #2 authenticated by the user may be examined, and service providers are also required to use a function in the form of a BCP.
FIG. 4 is a diagram illustrating an example of an actual service configuration according to an exemplary embodiment of the present invention. A user may delegate a right to access his or her data to a BCP, and a service provider may use user data under a contract with the BCP to which the right is delegated.
Functional characteristics of a BCP according to the present invention are as follows.
1. The BCP makes a data privacy-related contract with a user.
2. The BCP provides its own personal data storage or vault.
3. The BCP makes a contract with an online data storage used by the user.
4. The BCP provides an interface function of interoperating with the online data storage used by the user.
5. The BCP provides a BCP agent for monitoring a service usage environment of the user (an environment in which personal information-related data is generated).
First, a data privacy-related contract process between the BCP and the user is performed as follows.
The BCP provides a contract for data privacy as a method for clearly monitoring exposure of user data at various points of contact at which the user data is exposed online.
As for major exposable online data of the user, according to a contract with the user, (1) only a portion providable at major exposure points in the form of a software development kit (SDK) or application program interface (API) may be exposed, or (2) personal information may be distinguished through overall monitoring at a network monitoring level.
Here, a web-based or application-based server corresponds to (1), and corresponding service providers are required to provide information on a right to monitor data as well.
FIG. 5 is a flowchart illustrating a data privacy-related contract process between a BCP and a user.
Referring to FIG. 5 , the user may access the BCP, to which the user wants to delegate the right to access his or her data, for the purpose of contract formation (S501), and the BCP may receive a contract request of the user accessing the BCP (S501).
The BCP may receive the selection of a service (an online data storage or a service provider) used by the user (S502).
The BCP determines whether the BCP interoperates with the service selected by the user (S503). When the BCP does not interoperate with the service used by the user, a blockchain-based personal information providing service is not provided.
When the BCP interoperates with the service used by the user, the BCP may perform user authentication for data interoperation with the service (S504). For example, the BCP may request access to the service used by the user like an open authorization (OAuth) method.
When user authentication is completed, the BCP may set the scope of contract rights (S505). The scope of contract rights refers to the scope of access rights and may include, for example, data entries and monitoring and tracking periods. The service provider may provide information on the scope of data provision, the time point of consent, etc. agreed upon by the user at the time of subscription. Here, the BCP may set data accessibility such as API-based access and direct file access (DFA). Also, the BCP may set data coverage including whether to allow data access according to classes such as potential PII (PPII) and PII. In addition, the BCP may set data anonymization according to the user's request.
When the service used by the user is a new service or a user terminal collects data, information for the connection with the BCP may be set in a user environment (the terminal, application, Internet of things (IoT), etc.), and the BCP may receive the information for the connection with the user environment (S506). To this end, the BCP may provide an API gateway address to which data of the user will be uploaded.
In the case of an online service provider, such as a case in which user data is already present online, the setting operation with the terminal (S506) may be omitted.
The BCP may store information, which is set for the service used by the user through the above-described operations 5501 to 5506, as contract information with the user (S507).
As shown in FIG. 6 , a user may subscribe to a specific web service that he or she wants to use on a browser through various user environments.
For example, referring to FIG. 7 , the web service may confirm an intention to use a BCP in a user subscription process. When the user inputs his or her intention to use a BCP, a BCP login process may be provided, and the user may log in to the BCP used by himself or herself through the BCP login process.
The BCP may provide a list of data which may be monitored regarding the user's personal information requested by the web service that the user wants to subscribe to and then set a data entry selected by the user through the list as a monitoring target.
Next, a process of providing a BCP's own personal data storage is as follows.
The BCP may provide the function of a personal data storage or vault.
Referring to FIG. 8 , for example, Dropbox allows existing personal cloud data storage providers or productive tool providers to extend in a BCP form by adding a function of monitoring blockchain-based data input and output, controlling a right of user data input and output for smart contract-based external third party services, and monitoring whether to provide the right to a data management environment. In the case of Google, Google may contract with a separate BCP, and only the BCP may manage points of contact exposed to third parties so that Google may exclusively provide its own BCP function in conjunction with the BCP.
Next, a data transmission process employing a BCP agent is as follows.
FIG. 9 is a sequence diagram illustrating a data transmission process employing a BCP agent.
It is assumed that an actual photograph is uploaded online, and a BCP is aware of information on the corresponding data under a contract with an online data storage of a user.
Referring to FIG. 9 , when the user selects a photograph to post on a web service to which the user has logged in, a BCP agent acquires content information that the user wants to be externally exposed and then transmits the content information to the BCP.
The BCP may acquire an access uniform resource locator (URL) for the corresponding photograph information on the online data storage with which the user has contracted and then generate and transmit a separate URL for user data access.
When the user provides the URL information of the selected photograph for posting the photograph to the web service, the web service may search for BCP information in the URL information of the photograph and request the photograph from the BCP.
In response to the request from the web service, the BCP may make a smart contract with the web service and then transmit the photograph (the URL or the photograph in the form of a file) that the user wants to post to the web service. Then, the web service may use the actual user data, that is, the photograph.
After the user data is transmitted to the web service, the BCP may generate a transaction for a record of use of the user data by a provider of the web service.
The BCP may provide the BCP agent for monitoring a user service usage environment (personal information-related data generation environment).
Here, the BCP agent provides a function for interoperation between the BCP and user data generated by a general terminal or in a user device environment.
The BCP agent may be installed in each of the following environments.
1) Mobile OS Framework Level
A function for monitoring PII-related information, for example, permission, user generated data, and a system log, may be provided at the OS level.
2) Browser Extensions
A function for monitoring use or application of PII by web services, which do not provide a web service framework, may be provided using an extension of a browser installed on a user terminal.
3) Web Service Framework
A function for representing PII-related information in the form of, for example, “Privacy.jr” in a web service and monitoring the PII-related information may be provided.
4) PII-Related Service (Application or Application Client)
In an environment, such as a general social service, in which user data is provided to a third party (controller), 1) when all the data of a user is present in an online personal data storage, the online data may be transmitted through BCP-based relay, and 2) when it is necessary to upload user data at the time point of request, the data may be uploaded and then transmitted through the same process as described in 1).
According to the exemplary embodiments of the present invention, it is possible to provide an optimal balance point between the activation of data ecology, such as the data-driven fourth industry, and demands for the protection of individual privacy.
The above-described device may be implemented as a hardware component, a software component, and/or a combination of a hardware component and a software component. For example, the device and components described in the exemplary embodiments may be implemented using one or more general-purpose computers or special purpose computers such as a processor, a controller, an arithmetic logic unit (ALU), a digital signal processor, a microcomputer, a field programmable gate array (FPGA), a programmable logic unit (PLU), a microprocessor, or any other device capable of executing and responding to an instruction. The device may execute an OS and one or more software applications executed on the OS. In addition, the device may access, store, manipulate, process, and generate data in response to the execution of the software. For convenience of understanding, when a single device is described as being used in some cases, those of ordinary skill in the art recognize that the device may include a plurality of processing elements and/or a plurality of types of processing elements. For example, the device may include a plurality of processors or a single processor and a single controller. In addition, other processing configurations, such as a parallel processor, are also possible.
Software may include a computer program, code, an instruction, or one or more combinations thereof and may form the device to be operated as desired or may independently or collectively command the device. The software and/or data may be permanently or temporarily embodied in any type of machine, component, physical device, or computer storage medium or device in order to be interpreted by the device or provide an instruction or data to the device. The software may be distributed over a networked computer system to be stored or executed in a distributed manner. The software and data may be stored on one or more computer-readable recording media.
A method according to an exemplary embodiment may be implemented in a program instruction form, which may be executed through various computing devices, and recorded on a computer-readable medium. Here, the medium may continuously store the computer-executable program or temporarily store the computer-executable program for execution or downloading. Also, the medium may be a variety of recording devices or storage devices in the form of a single piece of hardware or a combination of a plurality of pieces of hardware. The medium is not limited to a medium directly connected to any computer system and may be dispersed on a network. Examples of the medium include a magnetic medium, such as a hard disk, a floppy disk, and magnetic tape, an optical recording medium, such as a CD-ROM and a DVD, a magneto-optical medium, such as a floptical disk, and media which are specially configured to store program instructions such as a ROM, a RAM, and a flash memory. As another example of the medium, there is a recording medium or a storage medium managed by an application store which distributes applications, or a website, a server, or the like which supplies or distributes various other software.
Although the present invention has been described above in connection with the limited embodiments and drawings, those of ordinary skill in the art may make various modifications and alterations from the description. For example, proper results may be achieved even when the descriptions are performed in an order different from that of the above-described method, and the components of the above-described system, structure, device, circuit, etc. are coupled or combined in a form different from that described above or replaced or substituted with other elements or equivalents.
Accordingly, other implementations, other embodiments, and the equivalents of the claims fall within the scope of the following claims.

Claims (13)

What is claimed is:
1. A method of providing personal information by using a blockchain controller for privacy (BCP) agent, executed in a computer device including at least one processor configured to execute computer-readable instructions included in a memory, the method comprising:
making, by the at least one processor, a data privacy-related contract with a user, by performing:
displaying a user interface to receive, from the user, a confirmation on an intention to use a blockchain controller for privacy (BCP), in a user subscription process;
providing a BCP login process, in response to the confirmation on the intention to use the BCP;
displaying a list of user data, which include user's personal information that is capable of being monitored and is requested by a web service that the user requested to subscribe; and
setting a monitoring target including a data entry selected by the user through the list; and
providing, by the at least one processor, through the BCP agent, the user data, according to the data privacy-related contract, to the web service, and monitoring, through the BCP agent, usages of the user data by the web service,
wherein the providing of the user data comprises:
receiving, from the user, a selection of a photograph included in the user data as a content to be posted to the web service;
acquiring, by the BCP agent, an access uniform resource locator (URL) of the photograph stored in an online data storage;
generating, by the BCP agent, a separate URL, which is different from the URL of the photograph stored in the online data storage and is linked to the BCP agent;
transmitting, by the BCP agent, the separate URL to the web service via a user terminal;
receiving, by the BCP agent, via the separate URL, from the web service, a request for the photograph; and
transmitting the photograph stored in the online data storage to the web service under the contract with the web service, and monitoring usages of the photograph by the web service.
2. The method of claim 1, wherein the making of the data privacy-related contract with the user further comprises:
performing user authentication for data interoperation with an online data storage which is used by the user to store the user data; and
setting an access right range for the online data storage when the user authentication is completed.
3. The method of claim 2, wherein the setting of the access right range comprises setting an accessible data entry and a monitoring period.
4. The method of claim 2, wherein the making of the data privacy-related contract with the user further comprises receiving information on a data providing range that the user has agreed on upon subscription from a web service provider of the online data storage.
5. The method of claim 1, wherein the making of the data privacy-related contract with the user comprises contracting with an online data storage, which is used by the user to store the user data, and providing an interface function of interoperating with the online data storage.
6. The method of claim 1, wherein the providing of the user data comprises providing a function of interoperating with the user data generated by a terminal of the user through the BCP agent for monitoring a web service usage environment of the user.
7. The method of claim 1, wherein the providing of the user data comprises:
when the user selects one piece of the user data as a content to be posted to the web service, acquiring access information of the content from an online data storage in which the user data is stored, and transmitting the access information to the web service; and
transmitting the content stored in the online data storage to the web service under the contract with the web service in response to a request from the web service using the access information.
8. The method of claim 7, wherein the monitoring comprises generating a transaction for a record of use of the user data by the web service after the content is transmitted to the web service.
9. A computer device including at least one processor configured to execute computer-readable instructions included in a memory, wherein the at least one processor comprises a controller configured to
make a data privacy-related contract with a user, by performing:
displaying a user interface to receive, from the user, a confirmation on an intention to use a blockchain controller for privacy (BCP) in a user subscription process;
providing a BCP login process, in response to the confirmation on the intention to use the BCP;
displaying a list of user data, which include user's personal information that is capable of being monitored and is requested by a web service that the user requested to subscribe; and
setting a monitoring target including a data entry selected by the user through the list; and
provide and monitor, through a BCP agent, the user data, according to the data privacy-related contract, to the web service, and monitoring, through the BCP agent, usages of the user data by the web service,
wherein the controller is further configured to perform:
receiving, from the user, a selection of a photograph included in the user data as a content to be posted to the web service;
acquiring, by the BCP agent, an access uniform resource locator (URL) of the photograph stored in an online data storage;
generating, by the BCP agent, a separate URL, which is different from the URL of the photograph stored in the online data storage and is linked to the BCP agent;
transmitting, by the BCP agent, the separate URL to the web service via a user terminal;
receiving, by the BCP agent, via the separate URL, from the web service, a request for the photograph; and
transmitting the photograph stored in the online data storage to the web service under the contract with the web service, and monitoring usages of the photograph by the web service.
10. The computer device of claim 9, wherein the controller is further configured to perform user authentication for data interoperation with an online data storage, which is used by the user to store the user data, and sets an access right range for the online data storage when the user authentication is completed.
11. The computer device of claim 9, wherein the controller is further configured to contract with an online data storage, which is used by the user to store the user data, and provides an interface function of interoperating with the online data storage.
12. The computer device of claim 9, wherein the controller is further configured to provide a function of interoperating with the user data generated by a terminal of the user through the BCP agent for monitoring a web service usage environment of the user.
13. The computer device of claim 9, wherein the controller is further configured to acquire, when the user selects one piece of the user data as content to be posted to the web service, access information of the content from an online data storage in which the user data is stored and transmits the access information to the web service, and
the controller is further configured to transmit the content stored in the online data storage to the web service under the contract with the web service in response to a request from the web service using the access information.
US17/408,277 2019-04-01 2021-08-20 Method and system of providing personal information based on blockchain Active 2040-08-18 US12111954B2 (en)

Applications Claiming Priority (3)

Application Number Priority Date Filing Date Title
KR1020190037652A KR102147431B1 (en) 2019-04-01 2019-04-01 Method and system for providing personal information based on block chain
KR10-2019-0037652 2019-04-01
PCT/KR2019/008233 WO2020204268A1 (en) 2019-04-01 2019-07-04 Method and system for providing blockchain-based personal information

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
PCT/KR2019/008233 Continuation WO2020204268A1 (en) 2019-04-01 2019-07-04 Method and system for providing blockchain-based personal information

Publications (2)

Publication Number Publication Date
US20210383024A1 US20210383024A1 (en) 2021-12-09
US12111954B2 true US12111954B2 (en) 2024-10-08

Family

ID=72235170

Family Applications (1)

Application Number Title Priority Date Filing Date
US17/408,277 Active 2040-08-18 US12111954B2 (en) 2019-04-01 2021-08-20 Method and system of providing personal information based on blockchain

Country Status (3)

Country Link
US (1) US12111954B2 (en)
KR (1) KR102147431B1 (en)
WO (1) WO2020204268A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201913144D0 (en) * 2019-09-12 2019-10-30 Nchain Holdings Ltd Sharing data via transactions of a blockchain
KR102688832B1 (en) * 2021-01-22 2024-07-26 주식회사 피아몬드 Method and system for collecting user inforamtion according to providing virtual desktop infrastructure service
CN117395239B (en) * 2023-11-16 2024-08-02 中国交通信息科技集团有限公司 Web service selection method based on block chain intelligent contract apparatus and medium

Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877460B1 (en) * 2005-09-16 2011-01-25 Sequoia International Limited Methods and systems for facilitating the distribution, sharing, and commentary of electronically published materials
KR101590076B1 (en) 2015-11-18 2016-02-01 주식회사 웨이브스트링 Method for managing personal information
US9294452B1 (en) * 2011-12-09 2016-03-22 Rightquestion, Llc Authentication translation
US20160147975A1 (en) * 2014-11-25 2016-05-26 Electronics And Telecommunications Research Institute Open healthcare apparatus and method
WO2017090041A1 (en) 2015-11-24 2017-06-01 Ben-Ari Adi A system and method for blockchain smart contract data privacy
US20180117446A1 (en) * 2016-05-02 2018-05-03 Bao Tran Smart device
KR101868029B1 (en) 2017-03-10 2018-06-18 현대카드 주식회사 Method and system for sharing file based on blockchain
JP2018109994A (en) * 2017-12-28 2018-07-12 株式会社Okeios Data utilization method, system, and program using bcn (block chain network)
US20180270367A1 (en) * 2017-03-17 2018-09-20 Ricoh Company, Ltd. Electronic apparatus, information processing apparatus, and communication system
KR101916302B1 (en) 2017-09-25 2018-11-07 삼성카드 주식회사 Method and apparatus for authenticating affiliate and user using blockchain
US20190045010A1 (en) * 2017-08-02 2019-02-07 Electronics And Telecommunications Research Institute Method and system for optimizing cloud storage services
US10298395B1 (en) * 2018-09-26 2019-05-21 Accenture Global Solutions Limited Interoperability of zero-knowledge proof enabled blockchains
US20200057487A1 (en) * 2016-11-21 2020-02-20 TeleLingo D/B/A dreyev Methods and systems for using artificial intelligence to evaluate, correct, and monitor user attentiveness
US20200268260A1 (en) * 2019-02-26 2020-08-27 Bao Tran Hearing and monitoring system

Patent Citations (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7877460B1 (en) * 2005-09-16 2011-01-25 Sequoia International Limited Methods and systems for facilitating the distribution, sharing, and commentary of electronically published materials
US9294452B1 (en) * 2011-12-09 2016-03-22 Rightquestion, Llc Authentication translation
US20160147975A1 (en) * 2014-11-25 2016-05-26 Electronics And Telecommunications Research Institute Open healthcare apparatus and method
KR101590076B1 (en) 2015-11-18 2016-02-01 주식회사 웨이브스트링 Method for managing personal information
WO2017090041A1 (en) 2015-11-24 2017-06-01 Ben-Ari Adi A system and method for blockchain smart contract data privacy
US20180117446A1 (en) * 2016-05-02 2018-05-03 Bao Tran Smart device
US20200057487A1 (en) * 2016-11-21 2020-02-20 TeleLingo D/B/A dreyev Methods and systems for using artificial intelligence to evaluate, correct, and monitor user attentiveness
KR101868029B1 (en) 2017-03-10 2018-06-18 현대카드 주식회사 Method and system for sharing file based on blockchain
US20180270367A1 (en) * 2017-03-17 2018-09-20 Ricoh Company, Ltd. Electronic apparatus, information processing apparatus, and communication system
US20190045010A1 (en) * 2017-08-02 2019-02-07 Electronics And Telecommunications Research Institute Method and system for optimizing cloud storage services
KR101916302B1 (en) 2017-09-25 2018-11-07 삼성카드 주식회사 Method and apparatus for authenticating affiliate and user using blockchain
JP2018109994A (en) * 2017-12-28 2018-07-12 株式会社Okeios Data utilization method, system, and program using bcn (block chain network)
US10298395B1 (en) * 2018-09-26 2019-05-21 Accenture Global Solutions Limited Interoperability of zero-knowledge proof enabled blockchains
US20200268260A1 (en) * 2019-02-26 2020-08-27 Bao Tran Hearing and monitoring system

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
Chakravorty, Antorweep, and Chunming Rong. "Ushare: user controlled social media based on blockchain." Proceedings of the 11th international conference on ubiquitous information management and communication. 2017. (Year: 2017). *
International Search Report issued in PCT/KR2019/008233; mailed Feb. 10, 2020.
Zheng, Xiaochen, et al. "Blockchain-based personal health data sharing system using cloud storage." 2018 IEEE 20th international conference on e-health networking, applications and services (Healthcom). IEEE, 2018. (Year: 2018). *

Also Published As

Publication number Publication date
KR102147431B1 (en) 2020-08-24
WO2020204268A1 (en) 2020-10-08
US20210383024A1 (en) 2021-12-09

Similar Documents

Publication Publication Date Title
US11520922B2 (en) Method for personal data administration in a multi-actor environment
US11582040B2 (en) Permissions from entities to access information
US12170694B2 (en) Data sharing
US20200058023A1 (en) Decentralized Data Marketplace
US12111954B2 (en) Method and system of providing personal information based on blockchain
US8332922B2 (en) Transferable restricted security tokens
TWI603267B (en) Providing selective access to resources
US10944560B2 (en) Privacy-preserving identity asset exchange
US9852309B2 (en) System and method for securing personal data elements
WO2019052496A1 (en) Account authentication method for cloud storage, and server
JP2021527858A (en) Location-based access to access-controlled resources
KR102160664B1 (en) General Data Protection Regulation Complied Blockchain Architecture for Personally Identifiable Information Management
KR20140030258A (en) Data custodian and curation system
US11763015B2 (en) Securely processing shareable data utilizing a vault proxy
Hardjono et al. Open algorithms for identity federation
US20160210692A1 (en) Data stocks integrated it multi-platform system
Xiong et al. Data resource protection based on smart contract
Khiem et al. Applying blockchain technology for privacy preservation in android platforms
US11556670B2 (en) System and method of granting access to data of a user
KR102567355B1 (en) System for providing data portability based personal information sharing platform service
KR20210152824A (en) Data evaluation management method for providing data compliance and system thereof
Kelbert et al. State of online privacy: A technical perspective
Winter et al. Security, privacy, and decentralization in Web3
EP4062303A1 (en) Privacy-preserving virtual email system
CN114338069B (en) System and method for granting access to data of a user

Legal Events

Date Code Title Description
AS Assignment

Owner name: INJE UNIVERSITY INDUSTRY-ACADEMIC COOPERATION FOUNDATION, KOREA, REPUBLIC OF

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:YANG, JINHONG;REEL/FRAME:057246/0066

Effective date: 20210819

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO UNDISCOUNTED (ORIGINAL EVENT CODE: BIG.); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FEPP Fee payment procedure

Free format text: ENTITY STATUS SET TO SMALL (ORIGINAL EVENT CODE: SMAL); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

STPP Information on status: patent application and granting procedure in general

Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION

STPP Information on status: patent application and granting procedure in general

Free format text: NON FINAL ACTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE TO NON-FINAL OFFICE ACTION ENTERED AND FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: FINAL REJECTION MAILED

STPP Information on status: patent application and granting procedure in general

Free format text: RESPONSE AFTER FINAL ACTION FORWARDED TO EXAMINER

STPP Information on status: patent application and granting procedure in general

Free format text: PUBLICATIONS -- ISSUE FEE PAYMENT VERIFIED

STCF Information on status: patent grant

Free format text: PATENTED CASE